<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyentrix.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyentrix.com/academy/module/</loc>
		<lastmod>2026-02-27T18:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/data-protection-fundamentals/</loc>
		<lastmod>2026-02-27T18:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/cloud-security-fundamentals/</loc>
		<lastmod>2026-02-27T18:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/foundations-of-identity-access-management/</loc>
		<lastmod>2026-02-27T18:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/securing-offices-data-centres/</loc>
		<lastmod>2026-02-20T03:46:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/cloud-configuration-posture-management/</loc>
		<lastmod>2026-02-19T10:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/cloud-security-architecture-strategy/</loc>
		<lastmod>2026-02-19T10:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/cloud-identity-access-management/</loc>
		<lastmod>2026-02-19T10:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/cloud-data-security-compliance/</loc>
		<lastmod>2026-02-19T10:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/device-endpoint-physical-security/</loc>
		<lastmod>2026-02-19T10:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/personnel-security/</loc>
		<lastmod>2026-02-19T10:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/physical-security-programme-management/</loc>
		<lastmod>2026-02-19T10:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/physical-security-fundamentals/</loc>
		<lastmod>2026-02-19T10:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/contracts-slas-for-security/</loc>
		<lastmod>2026-02-19T10:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/ongoing-vendor-monitoring/</loc>
		<lastmod>2026-02-19T10:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/supply-chain-security-resilience/</loc>
		<lastmod>2026-02-19T10:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/vendor-risk-management-fundamentals/</loc>
		<lastmod>2026-02-19T10:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/vendor-due-diligence-assessment/</loc>
		<lastmod>2026-02-19T10:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/building-a-security-awareness-programme/</loc>
		<lastmod>2026-02-19T10:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/phishing-social-engineering-defence/</loc>
		<lastmod>2026-02-19T10:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/password-hygiene-credential-security/</loc>
		<lastmod>2026-02-19T10:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/safe-computing-data-handling/</loc>
		<lastmod>2026-02-19T10:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/security-awareness-fundamentals/</loc>
		<lastmod>2026-02-19T10:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/crisis-communication-reporting/</loc>
		<lastmod>2026-02-19T10:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/incident-response-fundamentals/</loc>
		<lastmod>2026-02-19T10:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/building-an-incident-response-plan/</loc>
		<lastmod>2026-02-19T10:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/detection-triage/</loc>
		<lastmod>2026-02-19T10:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/containment-eradication-recovery/</loc>
		<lastmod>2026-02-19T10:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/privacy-regulatory-compliance/</loc>
		<lastmod>2026-02-19T10:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/backup-recovery-data-resilience/</loc>
		<lastmod>2026-02-19T10:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/encryption-data-at-rest-security/</loc>
		<lastmod>2026-02-19T10:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/data-loss-prevention-dlp/</loc>
		<lastmod>2026-02-19T10:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/wireless-remote-access-security/</loc>
		<lastmod>2026-02-19T10:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/network-security-architecture-monitoring/</loc>
		<lastmod>2026-02-19T10:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/network-security-fundamentals/</loc>
		<lastmod>2026-02-19T10:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/firewall-perimeter-defence/</loc>
		<lastmod>2026-02-19T10:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/intrusion-detection-prevention/</loc>
		<lastmod>2026-02-19T10:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/identity-attacks-defense-strategies/</loc>
		<lastmod>2026-02-19T08:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/iam-architecture-enterprise-implementation/</loc>
		<lastmod>2026-02-19T08:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/zero-trust-modern-identity/</loc>
		<lastmod>2026-02-19T08:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/role-based-access-control-least-privilege/</loc>
		<lastmod>2026-02-19T05:08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/privileged-access-management/</loc>
		<lastmod>2026-02-19T05:08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/identity-governance-access-reviews/</loc>
		<lastmod>2026-02-19T05:08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/module/multi-factor-authentication/</loc>
		<lastmod>2026-02-19T05:08:16+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->